Some TLS implementations are vulnerable to the October POODLE attack that at the time was thought to be limited to SSLv3 only: https://www.imperialviolet.org/2014/12/08/poodleagain.html . These implementations are incorrectly using a SSLV3 decoding function while in TLS mode. wolfSSL is not susceptible, it correctly uses TLS decoding while in TLS mode. We would like to reiterate Adam Langley’s advice to use TLS 1.2 with an AEAD cipher suite whenever possible. wolfSSL supports TLS 1.2 and has 3 cipher suite types supporting AEAD; AES-GCM, AES-CCM, and CHACHA20-POLY1305. 29 different AEAD cipher suites are available with TLS 1.2 in wolfSSL. Please contact us at firstname.lastname@example.org if you have any questions or comments.